IS3445 CHAP 8 SECURING WEB APPLICATIONS Flashcards
___ is a block cypher encryption standard that creates keys from 128 bis to 256 bits in length. AKA Rijndail.
(AES) Advanced Encryption Standard
___ is input validation mechanisms on the silent side using the client browser.
Client-side validation
___ is backtracking up a directory path using “../” or dot.dot.slash to access areas not intended to be accessible.
Canonicalization attacks
___is an encryption standard using a 56-bit key encryption method.
(DES) Data encryption standard
___is a small electronic file that serves to validate or encrypt a message or browser session. These are often used to create a digital signature which offers non-repudiation of a user or a Web site.
Digital certificate
___is an access control method in which access is not forced from the administrator or the operating system; rather, access is controlled by the information’s owner.
(DAC) Discretionary access control
___ is a security measures such as firewalls, IDSs, and antivirus solutions installed directly on a client system.
Host-based security
___ is an access control mechanism in which access is controlled and dictated by the network administrator.
(MAC) Mandatory access control
___ is a family of secret key cryptographic algorithms from RSA Security, Inc.
Rivest Cipher
___ A formal document from the Internet Engineering Task Force (IETF) that is the result of committee drafting and revision of a technical document.
(RFC) Request for Comments
___An access control mechanism in which access decisions are determined by the roles that individual users have as part of an organization.
Role based access control
___ An access control mechanism in which access to objects is controlled according to established rules.
Rule based access control
___ is the process of planning, designing, creating, testing, deploying, and maintaining software.
(SDLC) Software development life cycle
___ is the special type of access control list that monitors attempts to get into secured objects on a system.
(SACL) System access control list
___ is and encryption method that uses three 56-bit encryption keys.
(3DES) Triple Data Encryption Standard